Your search for 38191 returns 2423 document(s) |
Differential cryptanalysis of a reduced-round SEED, (LNCS-Lecture Notes in Computer Science 2576) Hal 186-198 |
Author: Hitoshi Yanami; Takeshi Shimoyama; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
On probability of success in linear and differential Cryptanalysis, (LNCS-Lecture Notes in Computer Science 2576) Hal 174-185 |
Author: Ali Aydin Selcuk; Ali Bicak; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Differential-linear cryptanalysis of serpent, (LNCS-Lecture Notes in Computer Science 2887) Hal 9-21 |
Author: Eli Biham; Orr Dunkelman; Nathan Keller; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Update on seed seed-192/256, (LNCS-Lecture Notes in Computer Science 5576) Hal. 1-10 |
Author: Kitae Jeong; Joongeun Choi; Yoseop Lee; Changhoon Lee; Jacchul Sung; Haeryong Park; Yeonjung Kang; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptanalysis of idea-x/2, (LNCS-Lecture Notes in Computer Science 2887) Hal 1-8 |
Author: Havard Raddum; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptanalysis of sober-t32, (LNCS-Lecture Notes in Computer Science 2887) Hal 111-128 |
Author: Steve Babbage; Christophe De Canniere; Joseph Lano; Bart Preneel; Joos Vandewalle; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Differential fault analysis on A.E.S, (LNCS-Lecture Notes in Computer Science 2576) Hal 293-306 |
Author: Pierre Dusart; Gilles Letourneux; Olivier Vivolo; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Differential uniformity for arrays, (LNCS-Lecture Notes in Computer Science 2898), Hal. 115-124 |
Author: K.J. Horadam; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptanalysis of block ciphers based on sha-1 and md5, (LNCS-Lecture Notes in Computer Science 2887) Hal 36-44 |
Author: Markku-Juhani O. Saarinen; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Optimal key ranking procedures in a statistical cryptanalysis, (LNCS-Lecture Notes in Computer Science 2887) Hal 235-246 |
Author: Pascal Junod; Serge Vaudenay; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|